General

  • Target

    33f6870266904dcf2e1084a5da3536a01041e3e636d3306163ab270024490acd

  • Size

    275KB

  • Sample

    220619-3enbxsaba9

  • MD5

    5bc468b6663bd98e06c8084cc9794065

  • SHA1

    b216217104adaaa021d5a89478ecf8176633ab8d

  • SHA256

    33f6870266904dcf2e1084a5da3536a01041e3e636d3306163ab270024490acd

  • SHA512

    aa47e7e19ec2bc158ed81932f35c2882ef1224a531bfb536e290c1e5274f6025b1ed68b54c6fd599adfba8fdd132f2dd9ef53c280c731a84497a33bef3724dcd

Malware Config

Extracted

Family

smokeloader

Version

2018

C2

http://taj.co.ug/

rc4.i32
rc4.i32

Targets

    • Target

      33f6870266904dcf2e1084a5da3536a01041e3e636d3306163ab270024490acd

    • Size

      275KB

    • MD5

      5bc468b6663bd98e06c8084cc9794065

    • SHA1

      b216217104adaaa021d5a89478ecf8176633ab8d

    • SHA256

      33f6870266904dcf2e1084a5da3536a01041e3e636d3306163ab270024490acd

    • SHA512

      aa47e7e19ec2bc158ed81932f35c2882ef1224a531bfb536e290c1e5274f6025b1ed68b54c6fd599adfba8fdd132f2dd9ef53c280c731a84497a33bef3724dcd

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks